Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1EBC2FE4D314EDA6B08BBA6F451B30A423AEDE304E1151BA78AED43EC4AC7C64FCB7444 |
|
CONTENT
ssdeep
|
384:SUfMkKWEY0H8AcjpfMkKWEY0H8AccqyjHstBKUAfCL:5QWEY0H8AcVQWEY0H8AcclHaBVAfCL |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c738388e86796979 |
|
VISUAL
aHash
|
193c003c3c3c3c3c |
|
VISUAL
dHash
|
f1f1d0c0e06060d0 |
|
VISUAL
wHash
|
193c3c7c3c3c3c3c |
|
VISUAL
colorHash
|
1e000038000 |
|
VISUAL
cropResistant
|
0024323232300800,f1f1d0c0e06060d0 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.